XMPPwocky / nodebeefclLinks
Recovers V8 Math.random seed from outputs, even when they are not consecutive.
☆32Updated 9 years ago
Alternatives and similar repositories for nodebeefcl
Users that are interested in nodebeefcl are comparing it to the libraries listed below
Sorting:
- BitErrant☆58Updated 8 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Parse raw C# serialization : https://msdn.microsoft.com/en-us/library/cc236865.aspx☆32Updated 7 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ☆36Updated 12 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- ☆138Updated 7 years ago
- ☆15Updated 8 years ago
- Wolves Among the Sheep☆147Updated last year
- hax 'n shit☆119Updated 10 years ago
- Growing list of potentially dangerous PHP functions☆52Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 4 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 9 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago